All resources sponsored by:

Veracode, Inc.

21 Matches
Disclosures 2012 - The Vulnerability of Publicly Traded Companies
sponsored by Veracode, Inc.
WEBCAST:In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software.
Posted: 24 May 2012 | Premiered: May 23, 2012
Get This Now


Top 10 Mobile Application Risks
sponsored by Veracode, Inc.
WEBCAST:In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.
Posted: 11 May 2012 | Premiered: May 11, 2012
Get This Now


Understanding the risks of mobile apps
sponsored by Veracode, Inc.
WHITE PAPER:Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.
Posted: 11 May 2012 | Published: 11 May 2012
Get This Now


Expert guide to understanding SaaS and cloud computing issues
sponsored by Veracode, Inc.
EGUIDE:This expert E-Guide discusses what is involved with a SaaS transition and how you can prepare. Uncover top considerations, potential cloud computing issues and how you can tackle them.
Posted: 21 Dec 2011 | Published: 21 Dec 2011
Get This Now


How to prevent cross-site scripting attacks: Expert tactics
sponsored by Veracode, Inc.
EGUIDE:This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks.
Posted: 21 Dec 2011 | Published: 21 Dec 2011
Get This Now


State of Software Security Report Volume 4
sponsored by Veracode, Inc.
WHITE PAPER:Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011
Get This Now


Musings on the PSN Attack Vector
sponsored by Veracode, Inc.
WEBCAST:Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011
Get This Now


Dirty Little Secrets: Mobile Apps Invading Your Privacy
sponsored by Veracode, Inc.
WEBCAST:Join Tyler Shields, Senior Security Researcher at Veracode, as he discusses the evolving mobile security threat landscape and shares real-world examples of how your data is being used (or misused) in some of the most popular mobile applications.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011
Get This Now


State of Software Security Report
sponsored by Veracode, Inc.
WHITE PAPER:The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code and thousands of applications.
Posted: 28 Feb 2011 | Published: 28 Feb 2011
Get This Now


Eradicate Cross-Site Scripting
sponsored by Veracode, Inc.
WHITE PAPER:The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation.
Posted: 28 Feb 2011 | Published: 28 Feb 2011
Get This Now


Barclays Application Security Assurance Project
sponsored by Veracode, Inc.
CASE STUDY:As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector.
Posted: 17 Feb 2011 | Published: 17 Feb 2011
Get This Now


Magic Quadrant for Static Application Security Testing
sponsored by Veracode, Inc.
WHITE PAPER:In this research, we analyze the evolution of the static application security testing market, and evaluate its vendors according to their business and technology vision, as well as their ability to execute against that vision in their products and services.
Posted: 17 Feb 2011 | Published: 17 Feb 2011
Get This Now


The Mobile App Top 10 Risks
sponsored by Veracode, Inc.
WEBCAST:This expert webcast reveals the top 10 mobile application risks facing organizations today.
Posted: 15 Feb 2011 | Premiered: Feb 15, 2011
Get This Now


Basic Building Blocks: Preparing for PCI DSS 2.0
sponsored by Veracode, Inc.
WEBCAST:With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
Posted: 04 Oct 2010 | Premiered: Oct 4, 2010
Get This Now


IT Risk Management: Guide to Software Risk Assessments and Audits
sponsored by Veracode, Inc.
WHITE PAPER:Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices.
Posted: 07 Jun 2010 | Published: 07 Jun 2010
Get This Now


Automating Your Code Review: Moving to a SaaS Model for Application Security
sponsored by Veracode, Inc.
WHITE PAPER:Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security.
Posted: 07 Jun 2010 | Published: 10 Feb 2009
Get This Now


Five Steps to Secure Outsourced Application Development
sponsored by Veracode, Inc.
WHITE PAPER:Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development.
Posted: 10 May 2010 | Published: 10 May 2010
Get This Now


Protecting Your Applications from Backdoors: How Static Binary Analysis Helps Build High-Assurance Applications
sponsored by Veracode, Inc.
WHITE PAPER:Backdoors pose operational risk to software that is too significant for organizations to ignore. Binary-level application testing (also called compiled-code analysis) makes it possible to examine the entire application in its final “as delivered” form. Read this white paper to learn more about protecting applications from backdoor vulnerabilities.
Posted: 10 May 2010 | Published: 10 May 2010
Get This Now


Veracode eLearning Subscription
sponsored by Veracode, Inc.
TRAINING GUIDE:Veracode’s eLearning contains over 30 hours of secure training content in a web-based training module format. The program is designed specifically for developers and security personnel to meet formal training and competency testing requirements. It also contains a comprehensive knowledgebase on secure software development. Read on to learn more.
Posted: 07 May 2010 | Published: 07 May 2010
Get This Now


Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST:The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010
Get This Now


Five Steps to Secure Outsourced Application Development
sponsored by Veracode, Inc.
WHITE PAPER:Application security has risen to the top of the agenda for security professionals striving to control their overall risk profile. According to US Computer Emergency Response Team (US-CERT) and Gartner, 75% of new attacks target the application layer and software vulnerabilities have reached...
Posted: 10 Feb 2009 | Published: 10 Feb 2009
Get This Now


21 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement